Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
clusterlabs vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-39976
log_blackbox.c in libqb prior to 2.0.8 allows a buffer overflow via long log messages because the header size is not considered.
Clusterlabs Libqb
NA
CVE-2023-2319
It exists that an update for PCS package in RHBA-2023:2151 erratum released as part of Red Hat Enterprise Linux 9.2 failed to include the fix for the Webpack issue CVE-2023-28154 (for PCS package), which was previously addressed in Red Hat Enterprise Linux 9.1 via erratum RHSA-20...
Clusterlabs Pcs 0.11.4-6.el9
Redhat Enterprise Linux High Availability Eus 9.2
Redhat Enterprise Linux High Availability 9.0
NA
CVE-2022-2735
A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "haclust...
Clusterlabs Pcs
Debian Debian Linux 11.0
NA
CVE-2021-3020
An issue exists in ClusterLabs Hawk (aka HA Web Konsole) up to and including 2.3.0-15. It ships the binary hawk_invoke (built from tools/hawk_invoke.c), intended to be used as a setuid program. This allows the hacluster user to invoke certain commands as root (with an attempt to ...
Clusterlabs Hawk
NA
CVE-2022-2553
The authfile directive in the booth config file is ignored, preventing use of authentication in communications from node to node. As a result, nodes that do not have the correct authentication key are not prevented from communicating with other nodes in the cluster.
Clusterlabs Booth
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Fedoraproject Fedora 35
Fedoraproject Fedora 36
6.5
CVSSv2
CVE-2022-1049
A flaw was found in the Pacemaker configuration tool (pcs). The pcs daemon was allowing expired accounts, and accounts with expired passwords to login when using PAM authentication. Therefore, unprivileged expired accounts that have been denied access could still login.
Clusterlabs Pcs
Debian Debian Linux 10.0
Debian Debian Linux 11.0
2.1
CVSSv2
CVE-2010-2496
stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local malicious users to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1...
Clusterlabs Cluster Glue
Clusterlabs Pacemaker
10
CVSSv2
CVE-2020-35458
An issue exists in ClusterLabs Hawk 2.x up to and including 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote malicious users to execute code a...
Clusterlabs Hawk 2.2.0-12
Clusterlabs Hawk 2.3.0-12
7.2
CVSSv2
CVE-2020-35459
An issue exists in ClusterLabs crmsh up to and including 4.2.1. Local attackers able to call "crm history" (when "crm" is run) were able to execute commands via shell code injection to the crm history commandline, potentially allowing escalation of privileges.
Clusterlabs Crmsh
Debian Debian Linux 9.0
9
CVSSv2
CVE-2020-25654
An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the confi...
Clusterlabs Pacemaker 2.0.5
Clusterlabs Pacemaker
Debian Debian Linux 9.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-2907
hardcoded
inject
CVE-2024-20359
CVE-2024-2467
CVE-2024-4077
CVE-2024-22391
camera
CVE-2024-20353
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »